to identify traffic that should be dropped
to classify traffic
to identify traffic that should receive common treatment
to assign traffic to output queues
第1题:
What are two step needed to define a QoS policy for a traffic class?()
第2题:
Which two statements correctly identify factors to consider when Configuring WAN QoS?()
第3题:
What are two functions associated with JUNOS software class of service?()
第4题:
What are the contents of a scheduler?()
第5题:
What are two purposes of a forwarding class?()
第6题:
You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network. Which inbound traffic should be allowed?()
第7题:
to identify traffic that should be dropped
to classify traffic
to identify traffic that should receive common treatment
to assign traffic to output queues
第8题:
VPN Traffic
DNS Traffic
LDAP Traffic
HTTP Traffic
HTTPS Traffic
Traffic from the network address of 192.168.10/24
第9题:
to rewrite the ToS bits in the IP header
to classify traffic
to identify traffic that should receive commom treatment
to assign traffic to output queues
第10题:
to maintain routing tables
to forward traffic toward its destination
to manage the PFE
to implement various services such as policing, stateless firewall filtering, and class of service
第11题:
to control vty access into a router
to control broadcast traffic through a router
to filter traffic as it passes through a router
to filter traffic that originates from the router
to replace passwords as a line of defense against security incursions
第12题:
to validate packet receipt on interfaces where the traffic should be received
to forward packets out the interfaces where the traffic should be received
to forward packets out the interfaces where the traffic should be sent
to validate packet receipt on interfaces where the traffic should be sent
第13题:
Which two statements are true about trust boundaries?()
第14题:
A company wants all IM chat via the internet to stop. A technician blocks IRC traffic with a traffic shaping device, yet IM chat remains useable. Which of the following should a technician do next?()
第15题:
What is the purpose of unicast reverse path forwarding?()
第16题:
What are three functions associated with JUNOS software class of service?()
第17题:
What are two purposes of a forwarding class?()
第18题:
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()
第19题:
both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCP
both traffic shaping and traffic policing support the marking and re-marking of traffic
the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing traffic
traffic shaping queues excess traffic whereas traffic policing discards excess traffic
traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
第20题:
Classifying and marking traffic should be done as close to the traffic source as possible.
Classifying and marking traffic should be done at the distribution layer.
Traffic is classified and marked as it travels through the network.
If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
The trust boundary moves depending on the type of traffic entering the network.
第21题:
You should place standard ACLS as close as possible to the source of traffic to be denied.
You should place extended ACLS as close as possible to the source of traffic to be denied.
You should place standard ACLS as close as possible to the destination of traffic to be denied.
You should place extended ACLS should be places as close as possible to the destination of traffic to be denied.
第22题:
Voice Traffic uses Assured Forwarding
Voice Signaling traffic uses Assured Forwarding
Voice Signaling traffic uses priority queuing
Voice Traffic uses priority queuing
Voice signaling traffic should use priority queuing with Assured Forwarding
第23题:
To watch for bandwidth issues
To protect the server from all traffic
To block certain traffic by ports
To monitor certain malicious traffic
第24题:
A scheduler contains parameters that describe how a queue should be serviced.
A scheduler contains traffic that is ready to be transmitted.
A scheduler contains forwarding classes that allow traffic to be forwarded.
A scheduler contains a map between the classification of a packet and its forwarding class.